{"id":"https://openalex.org/W1974570776","doi":"https://doi.org/10.1109/cdc.2011.6160863","title":"Multi-scale analysis of long range dependent traffic for anomaly detection in wireless sensor networks","display_name":"Multi-scale analysis of long range dependent traffic for anomaly detection in wireless sensor networks","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W1974570776","doi":"https://doi.org/10.1109/cdc.2011.6160863","mag":"1974570776"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2011.6160863","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2011.6160863","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Conference on Decision and Control and European Control Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100520054","display_name":"Shanshan Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shanshan Zheng","raw_affiliation_strings":["Institute for Systems Research, Department of Electrical and Computer Engineering, University of Maryland, College Park, USA","Institute for Systems Research and the Department of Electrical and Computer Engineering, University of Maryland, College Park, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Systems Research, Department of Electrical and Computer Engineering, University of Maryland, College Park, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Institute for Systems Research and the Department of Electrical and Computer Engineering, University of Maryland, College Park, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044395526","display_name":"John S. Baras","orcid":"https://orcid.org/0000-0002-4955-8561"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John S. Baras","raw_affiliation_strings":["Institute for Systems Research, Department of Electrical and Computer Engineering, University of Maryland, College Park, USA","Institute for Systems Research and the Department of Electrical and Computer Engineering, University of Maryland, College Park, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Systems Research, Department of Electrical and Computer Engineering, University of Maryland, College Park, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Institute for Systems Research and the Department of Electrical and Computer Engineering, University of Maryland, College Park, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100520054"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06742091,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4060","last_page":"4065"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7384365200996399},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6554129123687744},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.5793062448501587},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.5770660042762756},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.569807767868042},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5091220736503601},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.47816118597984314},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4520634412765503},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.45093122124671936},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.44747138023376465},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.41300082206726074},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30907177925109863},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.18382716178894043},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11520963907241821},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10770469903945923}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7384365200996399},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6554129123687744},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.5793062448501587},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.5770660042762756},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.569807767868042},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5091220736503601},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.47816118597984314},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4520634412765503},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.45093122124671936},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.44747138023376465},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.41300082206726074},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30907177925109863},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.18382716178894043},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11520963907241821},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10770469903945923},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc.2011.6160863","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2011.6160863","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Conference on Decision and Control and European Control Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2004217976","https://openalex.org/W2049686408","https://openalex.org/W2073680033","https://openalex.org/W2085533912","https://openalex.org/W2102616700","https://openalex.org/W2116618651","https://openalex.org/W2121511513","https://openalex.org/W2134929491","https://openalex.org/W2144191842","https://openalex.org/W2157366001","https://openalex.org/W2159160833","https://openalex.org/W3138598418","https://openalex.org/W4214540058","https://openalex.org/W4239856175","https://openalex.org/W4294071698","https://openalex.org/W4299324412","https://openalex.org/W6683238159"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1,56,75,152],"is":[2,80],"important":[3],"for":[4],"the":[5,24,44,63,85,109,114,131,144],"correct":[6],"functioning":[7],"of":[8,23,46,62,130],"wireless":[9],"sensor":[10,28],"networks.":[11],"Recent":[12],"studies":[13],"have":[14,36],"shown":[15],"that":[16,35],"node":[17],"mobility":[18],"along":[19],"with":[20],"spatial":[21],"correlation":[22],"monitored":[25],"phenomenon":[26],"in":[27,92,108,143],"networks":[29],"can":[30],"lead":[31],"to":[32,68,82],"observation":[33],"data":[34,87,90],"long":[37,64,157],"range":[38,65,158],"dependency,":[39],"which":[40,126],"could":[41],"significantly":[42],"increase":[43],"difficulty":[45],"anomaly":[47,55],"detection.":[48],"In":[49,72],"this":[50,70,73],"paper,":[51],"we":[52,117],"develop":[53],"an":[54,119],"scheme":[57,153],"based":[58],"on":[59],"multi-scale":[60],"analysis":[61],"dependent":[66,159],"traffic":[67,86],"address":[69],"challenge.":[71],"proposed":[74],"scheme,":[76],"discrete":[77],"wavelet":[78,110],"transform":[79],"used":[81],"approximately":[83],"de-correlate":[84],"and":[88],"capture":[89],"characteristics":[91],"different":[93],"time":[94,160],"scales.":[95],"The":[96],"remaining":[97],"dependencies":[98],"are":[99,138],"then":[100],"captured":[101],"by":[102],"a":[103],"multi-level":[104],"hidden":[105],"Markov":[106],"model":[107,115,146],"domain.":[111],"To":[112],"estimate":[113],"parameters,":[116],"propose":[118],"online":[120],"discounting":[121],"Expectation":[122],"Maximization":[123],"(EM)":[124],"algorithm,":[125],"also":[127],"tracks":[128],"variations":[129],"estimated":[132],"models":[133],"over":[134],"time.":[135],"Network":[136],"anomalies":[137],"detected":[139],"as":[140],"abrupt":[141],"changes":[142],"tracked":[145],"variation":[147],"scores.":[148],"We":[149],"evaluate":[150],"our":[151],"numerically":[154],"using":[155],"typical":[156],"series.":[161]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
